Categories

Web DevelopmentProgrammingDatabaseWindowsLinuxNetworkingMobile DevicesRaspberry PiOtherSponsored

ALL Articles

Data visualization in Jupyter Notebook using Pandas

This tutorial shows you how to visualize your data in Jupyter Notebook with the help of two Python libraries - Pandas and Matplotlib.

Password-less SSH login using Public key authentication

Public key authentication is a more secure and convenient way of login in to a remote server. Learn how to setup Public key authentication for SSH on Linux and Windows.

How to keep two Git repositories in sync

In this article we discuss how to keep two git repositories on different hosts in sync. For example you can sync a Github repo with a repo in Bitbucket or Gitlab

Docker Commands Cheat Sheat

This Docker commands cheat sheat contains most frequently used Docker commands for building and managing docker images, containers and network.

Binary search in C using recursion

A binary search is an algorithm to search the position of an element inside a sorted array. Here is a C program that performs binary search on an array using recursion.

C program for binary search

A binary search is an algorithm to search the position of an element inside a sorted array. Here is a C program implementation of binary search algorithm.

Implementing Jenkins one-at-a-time hash function in VB.NET

How to implement Jenkins one at a time hash in VB.NET. Jenkins one at a time hash is a hash function that produces a 4 byte hash value from a multi-byte input.

Increasing the size of a root partition on a Linux VM

This article gives you step-by-step instructions on how to increase the size of the LVM root partition on a Linux virtual machine running on Oracle Virtual Box.

Disk cloning in Linux using dd command

Examples of how to use dd command for disk image backup and restore and for cloning disk partitions or an entire disks.

Editing audio files with Audacity

In this article, you will learn how to use Audacity to modify and enhance audio files to meet your needs.